{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:35:47.175","vulnerabilities":[{"cve":{"id":"CVE-2021-4145","sourceIdentifier":"secalert@redhat.com","published":"2022-01-25T20:15:08.657","lastModified":"2024-11-21T06:36:59.903","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node."},{"lang":"es","value":"Se encontró un problema de desreferencia de puntero NULL en la capa de réplica de bloques de QEMU en versiones anteriores a 6.2.0. El puntero \"self\" es dereferenciado en mirror_wait_on_conflicts() sin asegurar que no sea NULL. Un usuario malicioso no privilegiado dentro del huésped podría usar este fallo para bloquear el proceso de QEMU en el host cuando la escritura de datos alcanza el umbral del nodo de reflejo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:C","baseScore":4.9,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:-:*:*:*:*:*:*","matchCriteriaId":"79CA7599-5B3C-4CFD-87BE-AF873AB01A14"},{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:rc0:*:*:*:*:*:*","matchCriteriaId":"608EDBA5-2746-4185-B1E7-1D5C77515BCF"},{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:rc1:*:*:*:*:*:*","matchCriteriaId":"08652ABF-7A2E-4E02-BF3A-DC7C59A4DC45"},{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:rc2:*:*:*:*:*:*","matchCriteriaId":"D278D47D-2E46-445F-AC12-BB89EE08F8D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:rc3:*:*:*:*:*:*","matchCriteriaId":"F1F2D762-2951-449C-A79D-C4FC347D6431"},{"vulnerable":true,"criteria":"cpe:2.3:a:qemu:qemu:6.1.0:rc4:*:*:*:*:*:*","matchCriteriaId":"5AFBBA57-5E54-4B05-ABEB-826E08CE7A07"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*","matchCriteriaId":"053C1B35-3869-41C2-9551-044182DE0A64"}]}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034602","source":"secalert@redhat.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd","source":"secalert@redhat.com","tags":["Patch","Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/202208-27","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20220311-0004/","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034602","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/202208-27","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20220311-0004/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}